WordPress Plugin Backdoor Hits 20K+ Sites in Supply Chain Attack

Plugin ownership changes led to malicious code affecting over 20,000 WordPress sites for eight months

C. da Costa Avatar
C. da Costa Avatar

By

Image: Deposit Photos

Key Takeaways

Key Takeaways

  • Backdoored WordPress plugin compromised 20,000+ sites through developer portfolio acquisition
  • Attackers used Ethereum blockchain contracts to evade detection and maintain control
  • WordPress’s automatic patch left dangerous PHP code intact in wp-config.php files

Corporate acquisitions just became a cybersecurity nightmare for WordPress users. A plugin developer portfolio with installations across thousands of sites was quietly acquired and subsequently backdoored—compromising more than 20,000 active WordPress installations. The malicious code lay dormant for eight months before springing to life, injecting spam and creating persistent backdoors that survive even WordPress’s forced security updates.

How the Blockchain-Powered Backdoor Works

Attackers used Ethereum smart contracts to evade traditional security measures and maintain control.

The backdoor landed in version 2.6.7, released last August, but stayed silent until this month. Here’s the clever part: attackers weaponized the legitimate wpos-analytics module, turning it into a PHP deserialization vulnerability that phones home for instructions.

Instead of using traditional command-and-control servers that can be taken down, the malware queries Ethereum blockchain contracts to find its next target. Think of it like a treasure map that can’t be destroyed—attackers simply update the smart contract to point to new domains whenever old ones get blocked.

The backdoor then creates a fake file called wp-comments-posts.php (notice the extra ‘s’) and injects massive PHP blocks into your wp-config.php, establishing permanent access.

WordPress’s Patch Doesn’t Actually Fix Everything

The forced update only disabled the phone-home mechanism while leaving dangerous code intact.

WordPress pushed version 2.6.9.1 to affected sites automatically, but here’s the problem: the fix only stopped the backdoor from calling home. All that injected PHP code sitting in wp-config.php? Still there. Still serving hidden spam content to Google’s crawlers while you remain blissfully unaware.

According to security researcher Austin Ginder of Anchor Hosting, this represents “the second hijack of a WordPress plugin discovered in as many weeks,” suggesting a troubling trend in supply chain targeting.

What You Need to Do Right Now

Don’t just update—completely remove compromised plugins and manually clean your files.

If you’re running WordPress sites, stop reading and start auditing:

  • Remove any compromised plugins entirely—don’t trust updates to clean them
  • Manually scrub your wp-config.php files for injected code blocks
  • Run comprehensive malware scans using tools like Wordfence or Sucuri
  • Change every administrative password on affected sites
  • Consider restoring from clean backups if you have them from before August 2025

The forced update bought you time, not safety.

WordPress users face a systemic vulnerability: no notification system exists when plugin ownership changes hands. You’re flying blind into potential supply chain attacks, making this incident unlikely to be the last.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →